期刊文献+
共找到212篇文章
< 1 2 11 >
每页显示 20 50 100
Beyond 5G Networks: Integration of Communication, Computing, Caching, and Control 被引量:3
1
作者 Musbahu Mohammed Adam Liqiang Zhao +1 位作者 Kezhi Wang Zhu Han 《China Communications》 SCIE CSCD 2023年第7期137-174,共38页
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating c... In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating communication,computing,caching,and control(i4C)technologies.In this survey,we first give a snapshot of different aspects of the i4C,comprising background,motivation,leading technological enablers,potential applications,and use cases.Next,we describe different models of communication,computing,caching,and control(4C)to lay the foundation of the integration approach.We review current stateof-the-art research efforts related to the i4C,focusing on recent trends of both conventional and artificial intelligence(AI)-based integration approaches.We also highlight the need for intelligence in resources integration.Then,we discuss the integration of sensing and communication(ISAC)and classify the integration approaches into various classes.Finally,we propose open challenges and present future research directions for beyond 5G networks,such as 6G. 展开更多
关键词 4C 6G integration of communication computing caching and control i4C multi-access edge computing(MEC)
下载PDF
Application of improved virtual sample and sparse representation in face recognition 被引量:1
2
作者 Yongjun Zhang Zewei Wang +4 位作者 Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1391-1402,共12页
Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face ... Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face recognition,differences in expression,angle,posture,and lighting conditions have become key factors that affect recognition accuracy.Essentially,there may be significant differences between different image samples of the same face,which makes image classification very difficult.Therefore,how to build a robust virtual image representation becomes a vital issue.To solve the above problems,this paper proposes a novel image classification algorithm.First,to better retain the global features and contour information of the original sample,the algorithm uses an improved non‐linear image representation method to highlight the low‐intensity and high‐intensity pixels of the original training sample,thus generating a virtual sample.Second,by the principle of sparse representation,the linear expression coefficients of the original sample and the virtual sample can be calculated,respectively.After obtaining these two types of coefficients,calculate the distances between the original sample and the test sample and the distance between the virtual sample and the test sample.These two distances are converted into distance scores.Finally,a simple and effective weight fusion scheme is adopted to fuse the classification scores of the original image and the virtual image.The fused score will determine the final classification result.The experimental results show that the proposed method outperforms other typical sparse representation classification methods. 展开更多
关键词 REPRESENTATION SAMPLE IMAGE
下载PDF
Computer Vision and Deep Learning-enabled Weed Detection Model for Precision Agriculture 被引量:1
3
作者 R.Punithavathi A.Delphin Carolina Rani +4 位作者 K.R.Sughashinir Chinnarao Kurangit M.Nirmala Hasmath Farhana Thariq Ahmed S.P.Balamurugan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2759-2774,共16页
Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital ... Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital role in influencing crop productivity.The wastage and pollution of farmland's natural atmosphere instigated by full coverage chemical herbicide spraying are increased.Since the proper identification of weeds from crops helps to reduce the usage of herbicide and improve productivity,this study presents a novel computer vision and deep learning based weed detection and classification(CVDL-WDC)model for precision agriculture.The proposed CVDL-WDC technique intends to prop-erly discriminate the plants as well as weeds.The proposed CVDL-WDC technique involves two processes namely multiscale Faster RCNN based object detection and optimal extreme learning machine(ELM)based weed classification.The parameters of the ELM model are optimally adjusted by the use of farmland fertility optimization(FFO)algorithm.A comprehensive simulation analysis of the CVDL-WDC technique against benchmark dataset reported the enhanced out-comes over its recent approaches interms of several measures. 展开更多
关键词 Precision agriculture smart farming weed detection computer vision deep learning
下载PDF
Estrada index of dynamic random graphs
4
作者 SHANG Yi-lun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2023年第2期159-165,共7页
The Estrada index of a graph G on n vertices is defined by EE(G)=∑^(n)_(i=1)^(eλ_(i)),whereλ_(1),λ_(2),···,λ_(n)are the adjacency eigenvalues of G.We define two general types of dynamic graphs evol... The Estrada index of a graph G on n vertices is defined by EE(G)=∑^(n)_(i=1)^(eλ_(i)),whereλ_(1),λ_(2),···,λ_(n)are the adjacency eigenvalues of G.We define two general types of dynamic graphs evolving according to continuous-time Markov processes with their stationary distributions matching the Erd¨os-R´enyi random graph and the random graph with given expected degrees,respectively.We formulate some new estimates and upper and lower bounds for the Estrada indices of these dynamic graphs. 展开更多
关键词 Estrada index temporary graph Markov process EIGENVALUE
下载PDF
A deep convolutional neural network for diabetic retinopathy detection via mining local and long-range dependence 被引量:1
5
作者 Xiaoling Luo Wei Wang +4 位作者 Yong Xu Zhihui Lai Xiaopeng Jin Bob Zhang David Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期153-166,共14页
Diabetic retinopathy(DR),the main cause of irreversible blindness,is one of the most common complications of diabetes.At present,deep convolutional neural networks have achieved promising performance in automatic DR d... Diabetic retinopathy(DR),the main cause of irreversible blindness,is one of the most common complications of diabetes.At present,deep convolutional neural networks have achieved promising performance in automatic DR detection tasks.The convolution operation of methods is a local cross-correlation operation,whose receptive field de-termines the size of the local neighbourhood for processing.However,for retinal fundus photographs,there is not only the local information but also long-distance dependence between the lesion features(e.g.hemorrhages and exudates)scattered throughout the whole image.The proposed method incorporates correlations between long-range patches into the deep learning framework to improve DR detection.Patch-wise re-lationships are used to enhance the local patch features since lesions of DR usually appear as plaques.The Long-Range unit in the proposed network with a residual structure can be flexibly embedded into other trained networks.Extensive experimental results demon-strate that the proposed approach can achieve higher accuracy than existing state-of-the-art models on Messidor and EyePACS datasets. 展开更多
关键词 image classification medical image processing pattern recognition
下载PDF
Combined Effect of Concept Drift and Class Imbalance on Model Performance During Stream Classification
6
作者 Abdul Sattar Palli Jafreezal Jaafar +3 位作者 Manzoor Ahmed Hashmani Heitor Murilo Gomes Aeshah Alsughayyir Abdul Rehman Gilal 《Computers, Materials & Continua》 SCIE EI 2023年第4期1827-1845,共19页
Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes over... Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes overtime, leading to class imbalance and concept drift issues. Both these issuescause model performance degradation. Most of the current work has beenfocused on developing an ensemble strategy by training a new classifier on thelatest data to resolve the issue. These techniques suffer while training the newclassifier if the data is imbalanced. Also, the class imbalance ratio may changegreatly from one input stream to another, making the problem more complex.The existing solutions proposed for addressing the combined issue of classimbalance and concept drift are lacking in understating of correlation of oneproblem with the other. This work studies the association between conceptdrift and class imbalance ratio and then demonstrates how changes in classimbalance ratio along with concept drift affect the classifier’s performance.We analyzed the effect of both the issues on minority and majority classesindividually. To do this, we conducted experiments on benchmark datasetsusing state-of-the-art classifiers especially designed for data stream classification.Precision, recall, F1 score, and geometric mean were used to measure theperformance. Our findings show that when both class imbalance and conceptdrift problems occur together the performance can decrease up to 15%. Ourresults also show that the increase in the imbalance ratio can cause a 10% to15% decrease in the precision scores of both minority and majority classes.The study findings may help in designing intelligent and adaptive solutionsthat can cope with the challenges of non-stationary data streams like conceptdrift and class imbalance. 展开更多
关键词 CLASSIFICATION data streams class imbalance concept drift class imbalance ratio
下载PDF
Comparison of Websites Employing Search Engine Optimization and Live Data
7
作者 Subhradeep Maitra Laxminarayan Sahoo +1 位作者 Supriyan Sen Kalishankar Tiwary 《Journal of Computer Science Research》 2023年第2期16-27,共12页
This study compares websites that take live data into account using search engine optimization(SEO).A series of steps called search engine optimization can help a website rank highly in search engine results.Static we... This study compares websites that take live data into account using search engine optimization(SEO).A series of steps called search engine optimization can help a website rank highly in search engine results.Static websites and dynamic websites are two different types of websites.Static websites must have the necessary expertise in programming compatible with SEO.Whereas in dynamic websites,one can utilize readily available plugins/modules.The fundamental issue of all website holders is the lower level of page rank,congestion,utilization,and exposure of the website on the search engine.Here,the authors have studied the live data of four websites as the real-time data would indicate how the SEO strategy may be applied to website page rank,page difficulty removal,and brand query,etc.It is also necessary to choose relevant keywords on any website.The right keyword might assist to increase the brand query while also lowering the page difficulty both on and off the page.In order to calculate Off-page SEO,On-page SEO,and SEO Difficulty,the authors examined live data in this study and chose four well-known Indian university and institute websites for this study:www.caluniv.ac.in,www.jnu.ac.in,www.iima.ac.in,and www.iitb.ac.in.Using live data and SEO,the authors estimated the Off-page SEO,On-page SEO,and SEO Difficulty.It has been shown that the Off-page SEO of www.caluniv.ac.in is lower than that of www.jnu.ac.in,www.iima.ac.in,and www.iitb.ac.in by 9%,7%,and 7%,respectively.On-page SEO is,in comparison,4%,1%,and 1%more.Every university has continued to keep up its own brand query.Additionally,www.caluniv.ac.in has slightly less SEO Difficulty compared to other websites.The final computed results have been displayed and compared. 展开更多
关键词 Search engine optimization Live data Off-page SEO On-page SEO SEO Difficulty
下载PDF
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications
8
作者 Mianjie Li Senfeng Lai +4 位作者 Jiao Wang Zhihong Tian Nadra Guizani Xiaojiang Du Chun Shan 《Digital Communications and Networks》 SCIE CSCD 2024年第1期38-44,共7页
Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user ... Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility. 展开更多
关键词 B5G Multimedia information security Spread transform dither modulation Spreading vector measurement Unit maximum capacity
下载PDF
Integrated Clustering and Routing Design and Triangle Path Optimization for UAV-Assisted Wireless Sensor Networks
9
作者 Shao Liwei Qian Liping +1 位作者 Wu Mengru Wu Yuan 《China Communications》 SCIE CSCD 2024年第4期178-192,共15页
With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated... With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated from monitoring and long-distance transmission places a heavy burden on sensor nodes with the limited battery power.For this,we investigate an unmanned aerial vehicles assisted mobile wireless sensor network(UAV-assisted WSN)to prolong the network lifetime in this paper.Specifically,we use UAVs to assist the WSN in collecting data.In the current UAV-assisted WSN,the clustering and routing schemes are determined sequentially.However,such a separate consideration might not maximize the lifetime of the whole WSN due to the mutual coupling of clustering and routing.To efficiently prolong the lifetime of the WSN,we propose an integrated clustering and routing scheme that jointly optimizes the clustering and routing together.In the whole network space,it is intractable to efficiently obtain the optimal integrated clustering and routing scheme.Therefore,we propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas,which can generate the chain matrix to guide the algorithm to find the solution faster.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that finds a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.Compared with the existing schemes,the proposed scheme can prolong the lifetime of the UAVassisted WSN at least by 360%,and shorten the collection path of UAVs by 56.24%. 展开更多
关键词 Monte-Las search strategy triangle path optimization unmanned aerial vehicles wireless sensor networks
下载PDF
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
10
作者 Muhammad Muntasir Yakubu Mohd Fadzil B Hassan +5 位作者 Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam 《Computer Systems Science & Engineering》 2024年第6期1437-1481,共45页
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t... This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications. 展开更多
关键词 Blockchain consensus mechanisms supply chain management proof of work(PoW) proof of stake(PoS) practical byzantine fault tolerance(PBFT)
下载PDF
A Survey of Human-centered Intelligent Robots:Issues and Challenges 被引量:33
11
作者 Wei He Zhijun Li C.L.Philip Chen 《IEEE/CAA Journal of Automatica Sinica》 CSCD 2017年第4期602-609,共8页
Intelligent techniques foster the dissemination of new discoveries and novel technologies that advance the ability of robots to assist and support humans. The human-centered intelligent robot has become an important r... Intelligent techniques foster the dissemination of new discoveries and novel technologies that advance the ability of robots to assist and support humans. The human-centered intelligent robot has become an important research field that spans all of the robot capabilities including navigation, intelligent control, pattern recognition and human-robot interaction. This paper focuses on the recent achievements and presents a survey of existing works on human-centered robots. Furthermore, we provide a comprehensive survey of the recent development of the human-centered intelligent robot and discuss the issues and challenges in the field. 展开更多
关键词 Human-centered robots human-robot interaction intelligent control NAVIGATION path planning pattern recognition
下载PDF
Path Planning and Navigation of Oceanic Autonomous Sailboats and Vessels: A Survey 被引量:2
12
作者 JING Wei LIU Chao +7 位作者 LI Ting RAHMAN A B M Mohaimenur XIAN Lintao WANG Xi WANG Yu GUO Zhongwen BRENDA Gumede TENDAI Wachi Kelvin 《Journal of Ocean University of China》 SCIE CAS CSCD 2020年第3期609-621,共13页
Oceanic autonomous surface vehicles(ASVs) are one kind of autonomous marine robots that have advantages of energy saving and is flexible to use. Nowadays, ASVs are playing an important role in marine science, maritime... Oceanic autonomous surface vehicles(ASVs) are one kind of autonomous marine robots that have advantages of energy saving and is flexible to use. Nowadays, ASVs are playing an important role in marine science, maritime industry, and national defense. It could improve the efficiency of oceanic data collection, ensure marine transportation safety, and protect national security. One of the core challenges for ASVs is how to plan a safe navigation autonomously under the complicated ocean environment. Based on the type of marine vehicles, ASVs could be divided into two categories: autonomous sailboats and autonomous vessels. In this article, we review the challenges and related solutions of ASVs' autonomous navigation, including modeling analysis, path planning and implementation. Finally, we make a summary of all of those in four tables and discuss about the future research directions. 展开更多
关键词 autonomous sailboats autonomous vessels model analysis path planning
下载PDF
Read-write rule property research of the combined function about the confidentiality and integrality 被引量:1
13
作者 LIU Yi-he 《通讯和计算机(中英文版)》 2008年第5期40-42,共3页
关键词 BLP模式 Biba模式 秘密性 完整性
下载PDF
Target tracking method of Siamese networks based on the broad learning system 被引量:1
14
作者 Dan Zhang C.L.Philip Chen +2 位作者 Tieshan Li Yi Zuo Nguyen Quang Duy 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期1043-1057,共15页
Target tracking has a wide range of applications in intelligent transportation,real‐time monitoring,human‐computer interaction and other aspects.However,in the tracking process,the target is prone to deformation,occ... Target tracking has a wide range of applications in intelligent transportation,real‐time monitoring,human‐computer interaction and other aspects.However,in the tracking process,the target is prone to deformation,occlusion,loss,scale variation,background clutter,illumination variation,etc.,which bring great challenges to realize accurate and real‐time tracking.Tracking based on Siamese networks promotes the application of deep learning in the field of target tracking,ensuring both accuracy and real‐time performance.However,due to its offline training,it is difficult to deal with the fast motion,serious occlusion,loss and deformation of the target during tracking.Therefore,it is very helpful to improve the performance of the Siamese networks by learning new features of the target quickly and updating the target position in time online.The broad learning system(BLS)has a simple network structure,high learning efficiency,and strong feature learning ability.Aiming at the problems of Siamese networks and the characteristics of BLS,a target tracking method based on BLS is proposed.The method combines offline training with fast online learning of new features,which not only adopts the powerful feature representation ability of deep learning,but also skillfully uses the BLS for re‐learning and re‐detection.The broad re‐learning information is used for re‐detection when the target tracking appears serious occlusion and so on,so as to change the selection of the Siamese networks search area,solve the problem that the search range cannot meet the fast motion of the target,and improve the adaptability.Experimental results show that the proposed method achieves good results on three challenging datasets and improves the performance of the basic algorithm in difficult scenarios. 展开更多
关键词 broad learning system siamese network target tracking
下载PDF
Usability and Effectiveness of Mobile Learning Course Content Application as a Revision Tool
15
作者 Ahmad Sobri Hashim Wan Fatimah Wan Ahmad Rohiza Ahmad 《Computer Technology and Application》 2011年第2期148-157,共10页
The use of mobile phone technologies in the education sector is getting more attention nowadays. This is due to the advancement of technologies equipped in majority of the mobile phones which makes the devices become ... The use of mobile phone technologies in the education sector is getting more attention nowadays. This is due to the advancement of technologies equipped in majority of the mobile phones which makes the devices become more capable of supporting the learning and teaching activities. Mobile learning (m-learning) is a learning tool which can be run on mobile devices. It can be considered as an enhancement to the electronic learning (e-learning). M-learning overcomes several limitations of e-learning especially in term of mobility. It provides more independent way of learning whereby learners can use the application to do the learning activities at anytime and any place. However, as with other learning and teaching applications, applications to be developed for mobile learning must also be developed based on certain learning theories and guidelines in order for them to be effective as well as usable. Therefore, in this paper, the development process of a mobile learning course content application called Mobile System Analysis and Design (MOSAD) as a revision tool will be shared and its testing's conduct and results will also be presented and discussed. MOSAD was developed with the content of a topic from the System Analysis and Design (SAD) course conducted at Universiti Teknologi PETRONAS (UTP). A heuristic test involving 5 experts in the area of Human Computer Interaction (HCI) were conducted after the first version of MOSAD was completed to strengthen its functionality and usability, followed by a Post Test Quasi Experimental Design which was conducted to 116 UTP second year students who took the SAD course to test the effectiveness and usability of MOSAD after it was revised. As a result from the post test, the students who had used MOSAD (66 out of the 116 students) as their revision tool for answering ten quiz questions obtained a mean score of 7.7576 as compared to 5.160 obtained by the other group of students (50 out of the 116 students) who used traditional methods of revision. Besides, usability test which tested on consistency, leamability, flexibility, minimal action and minimal memory load of MOSAD gave results above 3.5 for each metric based on the rating of 1 to 5. Thus, both results indicate that MOSAD is effective and usable as a revision tool for the higher education students. 展开更多
关键词 Mobile learning electronic learning HEURISTIC post test quasi experimental design usability.
下载PDF
Automated Colorization of Grayscale Images Using Texture Descriptors and a Modified Fuzzy C-Means Clustering
16
作者 Christophe Gauge Sreela Sasi 《Journal of Intelligent Learning Systems and Applications》 2012年第2期135-143,共9页
A novel example-based process for Automated Colorization of grayscale images using Texture Descriptors (ACTD) without any human intervention is proposed. By analyzing a set of sample color images, coherent regions of ... A novel example-based process for Automated Colorization of grayscale images using Texture Descriptors (ACTD) without any human intervention is proposed. By analyzing a set of sample color images, coherent regions of homogeneous textures are extracted. A multi-channel filtering technique is used for texture-based image segmentation, combined with a modified Fuzzy C-means (FCM) clustering algorithm. This modified FCM clustering algorithm includes both the local spatial information from neighboring pixels, and the spatial Euclidian distance to the cluster’s center of gravity. For each area of interest, state-of-the-art texture descriptors are then computed and stored, along with corresponding color information. These texture descriptors and the color information are used for colorization of a grayscale image with similar textures. Given a grayscale image to be colorized, the segmentation and feature extraction processes are repeated. The texture descriptors are used to perform Content-Based Image Retrieval (CBIR). The colorization process is performed by Chroma replacement. This research finds numerous applications, ranging from classic film restoration and enhancement, to adding valuable information into medical and satellite imaging. Also, this can be used to enhance the detection of objects from x-ray images at the airports. 展开更多
关键词 Image Processing Pattern Recognition COMPUTER VISION Fuzzy C-MEANS CLUSTERING GABOR
下载PDF
Real-Time Detection of Human Drowsiness via a Portable Brain-Computer Interface
17
作者 Julia Shen Baiyan Li Xuefei Shi 《Open Journal of Applied Sciences》 2017年第3期98-113,共16页
In this paper, we proposed a new concept: depth of drowsiness, which can more precisely describe the drowsiness than existing binary description. A set of effective markers for drowsiness: normalized band norm was suc... In this paper, we proposed a new concept: depth of drowsiness, which can more precisely describe the drowsiness than existing binary description. A set of effective markers for drowsiness: normalized band norm was successfully developed. These markers are invariant from voltage amplitude of brain waves, eliminating the need for calibrating the voltage output of the brain-computer interface devices. A new polling algorithm was designed and implemented for computing the depth of drowsiness. The time cost of data acquisition and processing for each estimate is about one second, which is well suited for real-time applications. Test results with a portable brain-computer interface device show that the depth of drowsiness computed by the method in this paper is generally invariant from ages of test subjects and sensor channels (P3 and C4). The comparison between experiment and computing results indicate that the new method is noticeably better than one of the recent methods in terms of accuracy for predicting the drowsiness. 展开更多
关键词 Brain-Computer Interface BRAIN Wave DROWSINESS Real-Time FOURIER TRANSFORM POLLING Algorithm
下载PDF
Optimal Deep Belief Network Enabled Malware Detection and Classification Model
18
作者 P.Pandi Chandran N.Hema Rajini M.Jeyakarthic 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3349-3364,共16页
Cybercrime has increased considerably in recent times by creating new methods of stealing,changing,and destroying data in daily lives.Portable Docu-ment Format(PDF)has been traditionally utilized as a popular way of s... Cybercrime has increased considerably in recent times by creating new methods of stealing,changing,and destroying data in daily lives.Portable Docu-ment Format(PDF)has been traditionally utilized as a popular way of spreading malware.The recent advances of machine learning(ML)and deep learning(DL)models are utilized to detect and classify malware.With this motivation,this study focuses on the design of mayfly optimization with a deep belief network for PDF malware detection and classification(MFODBN-MDC)technique.The major intention of the MFODBN-MDC technique is for identifying and classify-ing the presence of malware exist in the PDFs.The proposed MFODBN-MDC method derives a new MFO algorithm for the optimal selection of feature subsets.In addition,Adamax optimizer with the DBN model is used for PDF malware detection and classification.The design of the MFO algorithm to select features and Adamax based hyperparameter tuning for PDF malware detection and classi-fication demonstrates the novelty of the work.For demonstrating the improved outcomes of the MFODBN-MDC model,a wide range of simulations are exe-cuted,and the results are assessed in various aspects.The comparison study high-lighted the enhanced outcomes of the MFODBN-MDC model over the existing techniques with maximum precision,recall,and F1 score of 97.42%,97.33%,and 97.33%,respectively. 展开更多
关键词 PDF malware data classification SECURITY deep learning feature selection metaheuristics
下载PDF
Classification of Adversarial Attacks Using Ensemble Clustering Approach
19
作者 Pongsakorn Tatongjai Tossapon Boongoen +2 位作者 Natthakan Iam-On Nitin Naik Longzhi Yang 《Computers, Materials & Continua》 SCIE EI 2023年第2期2479-2498,共20页
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of attacks.To safeguard these,a perimeter defence l... As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of attacks.To safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known intrusions.There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive traffics.The current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network applications.In contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class labels.These ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their combinations.Based on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the literature.This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated intrusions.In addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use. 展开更多
关键词 Intrusion detection adversarial attack machine learning feature transformation ensemble clustering
下载PDF
Multimodal Machine Learning Based Crop Recommendation and Yield Prediction Model
20
作者 P.S.S.Gopi M.Karthikeyan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期313-326,共14页
Agriculture plays a vital role in the Indian economy.Crop recommen-dation for a specific region is a tedious process as it can be affected by various variables such as soil type and climatic parameters.At the same time... Agriculture plays a vital role in the Indian economy.Crop recommen-dation for a specific region is a tedious process as it can be affected by various variables such as soil type and climatic parameters.At the same time,crop yield prediction was based on several features like area,irrigation type,temperature,etc.The recent advancements of artificial intelligence(AI)and machine learning(ML)models pave the way to design effective crop recommendation and crop pre-diction models.In this view,this paper presents a novel Multimodal Machine Learning Based Crop Recommendation and Yield Prediction(MMML-CRYP)technique.The proposed MMML-CRYP model mainly focuses on two processes namely crop recommendation and crop prediction.At the initial stage,equilibrium optimizer(EO)with kernel extreme learning machine(KELM)technique is employed for effectual recommendation of crops.Next,random forest(RF)tech-nique was executed for predicting the crop yield accurately.For reporting the improved performance of the MMML-CRYP system,a wide range of simulations were carried out and the results are investigated using benchmark dataset.Experi-mentation outcomes highlighted the significant performance of the MMML-CRYP approach on the compared approaches with maximum accuracy of 97.91%. 展开更多
关键词 AGRICULTURE crop recommendation yield prediction machine learning artificial intelligence
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部